Difference between revisions of "Bluetooth Security Features"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
(Created page with "== Summary == '''This Page is work in progress please come back later.''' This documentation is about the security features of Bluetooth Classic and Bluetooth Low Energy....")
 
Line 3: Line 3:
'''This Page is work in progress please come back later.'''
'''This Page is work in progress please come back later.'''


This documentation is about the security features of Bluetooth Classic and Bluetooth Low Energy.  
This documentation is a survey about the security features of Bluetooth Classic and Bluetooth Low Energy.  


== Basic Security Services ==
== Basic Security Services ==

Revision as of 12:18, 4 February 2020

Summary

This Page is work in progress please come back later.

This documentation is a survey about the security features of Bluetooth Classic and Bluetooth Low Energy.

Basic Security Services

  • Authentication: verifies the identity of communicating devices based on their Bluetooth address. User authentication is not provided by the Bluetooth Specification.
  • Confidentiality: prevents eavesdropping of the transmitted data by an untrusted third person in the piconet. Confidentiality is created by data encryption.
  • Authorization: controls the access of the resources. It assures that only authorized devices get permitted to access a service.
  • Message Integrity: checks if the data was altered during the transmission.
  • Pairing/Bonding: creates shared secret keys to use them in subsequent connections.

Bluetooth Classic Security

Security Mode 1

Security Mode 2

Security Mode 3

Security Mode 4

  • Layer 0:
  • Layer 1:
  • Layer 2:
  • Layer 3:
  • Layer 4:

Bluetooth Low Energy Security

WIP

WIP

WIP

WIP
WIP

WIP

WIP

  • WIP
  • WIP
  • WIP

Courses

References